Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Information and communication Technology"

ADD TO MY LIST
 
Analysing Lecturers` Web/Internet Competence at the Zimbabwe Open University

Author(s): Bukaliya Richard and Paul Rumbidzai Dzimano
An Evaluation Framework for Saudi E-Government

Author(s): Hana Abdullah Al-Nuaim
Achievements of Nursing Portal Development in Selected Countries

Author(s): Reza Safdari | Mashaallah Torabi | Mohammad Ali Cheraghi | Niloufar Masoori | Zahra Azadmanjir
Security Enhancement in Dynamic Telecast Routing

Author(s): Dr. GVN Prasad | M.Senthilkumar
Engineering a Grimm approach to enhancing student engagement with health and safety lectures: a new perspective on an ancient pedagogy

Author(s): Cliodhna McCormac | Graham R. Dale | Jolene Phair | Kevin McHugh | James Davis
Corporate Talent Needs and Availability in Malaysian Service Industry

Author(s): Alan G. Downe | Siew-Phaik Loke | Jessica Sze-Yin Ho | Ayankunle Adegbite Taiwo
ITs in Engineering Education: Joining Efforts Between SPEE and IGIP

Author(s): Alberto Cardoso | Carlos Vaz de Carvalho | Fernão de Magalhães | Pedro Neto | M. Graça Rasteiro | M. Teresa Restivo | Danilo G. Zutin | Bill Williams
Complete Vision-Based Traffic Sign Recognition Supported by an I2V Communication System

Author(s): Miguel A. García-Garrido | Manuel Ocaña | David F. Llorca | Estefanía Arroyo | Jorge Pozuelo | Miguel Gavilán
A CONFIGURABLE SECURED IMAGE ENCRYPTION TECHNIQUE USING 3D ARRAY BLOCK ROTATION

Author(s): G. Lokeshwari | Dr. S. Udaya Kumar | G. Aparna
MAC based Approaches for Multicast Source Authentication

Author(s): Ramanpreet Kaur | Amrit Lal Sangal | Krishan Kumar
THE EFFECT OF THE INTERNET ON TRADE FLOWS

Author(s): Seyed Reza Miraskari | Noorollah Salehi Asfiji | Seyed Abdolkarim Siadat | Seyed Ali Mirasgari
Wireless Sensor Network Safety Study

Author(s): M.Shankar | Dr.M.Sridar | Dr.M.Rajani
Design and Implementation of RF Deployed SMS Based Equipment Controller

Author(s): Sadeque Reza Khan | Ahmed Al Mansur | Muhammad Towhidur Rahman
Question Answering System for an Effective Collaborative Learning

Author(s): Prof. Kohei Arai | Anik Nur Handayani
Wideband Wireless Access Systems Interference Robustness: Its Effect on Quality of Video Streaming

Author(s): Aderemi A. Atayero | Oleg I. Sheluhin | Yuri A. Ivanov | Julet O. Iruemi
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna

Author(s): Valery Korzhik | Viktor Yakovlev | Yuri Kovajkin | Guillermo Morales-Luna
Diseño para el conocimiento reglado de acceso libre a través de Internet

Author(s): Morillo Balsera, M. C. | Sebastian Lorente, L. | Casado Fuente, M. L.
Forest Fire Prevention using Wireless Sensor Networks

Author(s): PRASHANTH | Prof K.Ashok Babu
Protection through Oblivion 'An Image Based Steganography'

Author(s): T Chandra Sekhara Reddy | D Prasad | B.Venkateswara Reddy
Application Based Detection Technique for Secure Mobile Ad-hoc Network

Author(s): Kamini Maheshwar | Sapna Bagde | Deshraj Ahirwar
New ICT Trends in E-Health

Author(s): Peter Ciganek | Rastislav Pirnik | Tatiana Broncekova
Mobille Business, Quo Vadis?

Author(s): Robert Hudec | Peter Ciganek
New Services Development

Author(s): Peter Ciganek | Robert Hudec
Implementation of a Controller Unit for an Intelligent Ventilation System (IVS) for a BTS Room

Author(s): Sadeque Reza Khan | Ahmed Al Mansur | S.M. Ferdous
Neural based Post Processing Filtering Technique for Image Quality Enhancement

Author(s): R. Pushpavalli | G. Sivaradje | E. Srinivasan | S.Himavathi
POWER – AWARE ROUTING IN MANET USING RANDOMIZED CASTING

Author(s): B.Siva kumar | K.Tharani | S.venkatasen
A New Secure Multicast Key Distribution Scheme Using Tabulation Method

Author(s): R. Varalakshmi | V. Rhymend Uthariaraj
A Novel and Cost Effective Approach to Public Vehicle Tracking System

Author(s): Deepak Mishra | Apurv Vasal | Puneet Tandon
Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

Author(s): Andrea Caiti | Vincenzo Calabrò | Gianluca Dini | Angelica Lo Duca | Andrea Munafò
Bluetooth Security Threats And Solutions: A Survey

Author(s): Nateq Be-Nazir Ibn Minar | Mohammed Tarique
A Novel Security Framework Using Trust And Fuzzy Logic In Manet

Author(s): Manoj V | Mohammed Aaqib | Raghavendiran N | Vijayan R
Risks and Remedies in E-Learning System

Author(s): Nikhilesh Barik | Sunil Karforma
Primary School Pupils’ ICT Literacy In Northern Aegean

Author(s): Giavrimis Panagiotis, Ekaterini Nikolarea
POLLY CLINIC INQUIRY SYSTEM USING IVR IN MARATHI LANGUAGE

Author(s): SANTOSH GAIKWAD*, BHARTI GAWALI and MEHROTRA S.C.
Training needs of teachers in ICT: Training profiles and elements of complexity

Author(s): Almerich, Gonzalo | Suárez-Rodríguez, Jesús M. | Belloch, Consuelo | Bo, Rosa M.
Inverted Pattern in Inverted Time Domain for Icon Steganography

Author(s): Rengarajan Amirtharajan | John Bosco Balaguru Rayappan
數據資料庫 Numeric Databases

Author(s): Mei-ling Wang Chen
Electronic Scholarly Journals: A Review of Technical Issues in Digital Environment

Author(s): Golnessa Galyani Moghaddam | Shalini R. Urs
Real-time flood monitoring and warning system

Author(s): Jirapon Sunkpho | Chaiwat Ootamakorn
Enhancing Hash Function Selection Techniques Based on Message Contents

Author(s): Ali Saeed | Muhammad Khalil Shahid
Investigating Rural Library Usage among Rural Youth in Malaysia: Its Corresponding Determinants and Impacts

Author(s): Siti Zobidah Omar | Hayrol Azril Mohamed Shaffril | Jusang Bolong | Jeffrey Lawrence D’Silva
ON-LINE MARKETING-COMMUNICATION IN HUNGARY

Author(s): Krisztina TARALIK
Mathematical Modeling the Economic and Cultural Impacts of ICT in Iran

Author(s): Farzaneh Chavoshbashi | Masomali Salimian
Data Hiding in JPEG Images

Author(s): S. K. Muttoo | Sushil Kumar
Data Dissemination in Mobile Computing Environment

Author(s): S. Krishna Mohan Rao | Dr A. Venugopal Reddy
Computer and Internet use Among Families: A Case of Botswana

Author(s): Dr. Rama Srivastava | Mr. Ishaan Srivastava
Performance Analysis of High Speed Data Networks Using Priority Discipline

Author(s): K. Bhatia | A. K. Pal | Anu Chaudhary
Distributed Coding/Decoding Complexity in Video Sensor Networks

Author(s): Paulo J. Cordeiro | Pedro Assunção
MANEMO for Fishing Trolleys in Deep Sea

Author(s): Sulata Mitra | Sumanta Pyne | Arkadeep Goswami
Dynamic Data Updates for Mobile Devices by Using 802.11 Wireless Communications

Author(s): B. V. Ramanamurthy | K. Srinivas Babu | Mohammed Sharfuddin
Load Balancing in Integrated MANET, WLAN and Cellular Network

Author(s): Sulata Mitra | Arkadeep Goswami
Exploring Alternative Topologies for Network-on-Chip Architectures

Author(s): Shafi Patel | Parag Parandkar | Sumant Katiyal | Ankit Agrawal
Semantic Massage Addressing based on Social Cloud Actor's Interests

Author(s): Reem M. Bahgat | Akram I. Salah | Hamada I. Abdul Wakeil
A Complete Simulation of Target Detection and Estimation Using 77 GHz Radar

Author(s): Arun Kumar Singh | Samerendra Nath Sur | Amit Agarwal | Rabindranath Bera
Quality and Distortion Evaluation of Audio Signal by Spectrum

Author(s): Er. Niranjan Singh | Dr. Bhupendra Verma
TRACKING OF INTRUDERS ON GEOGRAPHICAL MAP USING IDS ALERT

Author(s): Manish Kumar | M. Hanumanthappa | T.V. Suresh Kumar
GSM-Based Wireless Database Access For Food And Drug Administration And Control

Author(s): Engr. Prof Hyacinth C. Inyiama | Engr. Mrs Lois Nwobodo | Engr. Dr. Mrs. Christiana C. Okezie | Engr. Mrs. Nkolika O. Nwazor
Improving High-Tech Product Development through Communication Audits

Author(s): Janne Harkonen | Matti Mottonen | Mirja Vaananen | Pekka Belt
Improving High-Tech Product Development through Communication Audits

Author(s): Janne Harkonen | Matti Mottonen | Mirja Vaananen | Pekka Belt
Relocatable, Automated Cost-Benefit Analysis for Marine Sensor Network Design

Author(s): Claire D’Este | Paulo de Souza | Chris Sharman | Simon Allen
Energy Saving in Wireless Sensor Networks

Author(s): Zahra Rezaei | Shima Mobininejad
Dynamic Real Time Distributed Sensor Network Based Database Management System Using XML, JAVA and PHP Technologies

Author(s): D. Sudharsan | J. Adinarayana | S. Ninomiya | M. Hirafuji | T. Kiura
Accurate location estimation of moving object In Wireless Sensor network

Author(s): Vijay Bhaskar Semwal | Vinay Bhaskar Semwal | Meenakshi Sati | Shirshu Verma
A Survey on Cross Layer Security

Author(s): Sandeep Sharma | Rajesh Mishra | Karan Singh
FPGA Implementation of Viterbi Decoder

Author(s): ANUBHUTI KHARE | MANISH SAXENA | JAGDISH PATEL
Coal Mine Rescue Robot

Author(s): C.D.Bhos | J.G.Rana
PAPR Reduction for OFDM System Using Companding Technique

Author(s): Bahubali K. Shiragapur | Uday Wali
Image Stenography Skin Tone Detection

Author(s): DEEPALI BHAMARE | VIKAS GUPTA | P.B.SALUNKHE
Quality of Service Using PSO Algorithm

Author(s): S.M. ELseuofi
SignsWorld; Deeping into the Silence World and Hearing Its Signs (StAte oF the Art)

Author(s): A.M. Riad | Hamdy K.Elmonier | Samaa.M.Shohieb | A.S. Asem
An Effective CBIR using Texture

Author(s): Asmita Deshmukh | Leena Ragha | Gargi Phadke
Modeling of SMF Link for Optical Networks

Author(s): B U Rindhe | S K Narayankhedkar | Sanjay Dudul
Nodes Credit based Direct Diffusion for wireless sensor networks

Author(s): Archana Patel | Surendra Verma | Roshani Patel
Survey of MAC Layer Protocols for vehicular Ad Hoc Network

Author(s): Vimal Bibhu | Dhirendra Kumar Singh
A Smart and Secure Wireless Communication System: Cognitive Radio

Author(s): Shrikrishan Yadav | Santosh Kumar Singh | Krishna Chandra Roy
Interfacing of Sensor Network to Communication Network for Disaster Management

Author(s): Sanjay Patel | O. P. Vyas | Hansa Mehra
Analyzing Digital Signature Robustness with Message Digest Algorithms

Author(s): Rubina B. Patel | Naveen Chaudhary
Why do you need a reservation system?      Affiliate Program